Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Using the "quantum annealing" method, the company said its research found that even the strongest versions of the advanced encryption standard may be decodable by quantum computers that could be available a few years from now.

Privacy News Online | Weekly Review: September 18, 2020

Privacy News Online | Weekly Review: September 18, 2020

The FCC had a call for public comments regarding President Trump’s censor the internet executive order which seeks to strip away key free speech legal protections for websites and usher in a new era of government backed internet censorship.

Explainer: What is post-quantum cryptography?

Explainer: What is post-quantum cryptography?

A report on quantum computing published last year by the US National Academies of Sciences, Engineering, and Medicine predicted that a powerful quantum computer running Shor’s algorithm would be capable of cracking a 1,024-bit implementation of RSA in less than a day.

Researchers teleport information within a diamond

Researchers teleport information within a diamond

"Quantum teleportation permits the transfer of quantum information into an otherwise inaccessible space," said Hideo Kosaka, a professor of engineering at Yokohama National University and an author on the study.

Facebook is helping Intel design their next processor

Facebook is helping Intel design their next processor

Facebook is working with Intel to improve its upcoming Copper Lake processors. The company is helping Intel add a touch of deep learning to the Copper Lake processors to improve the performance. Intel is expected to release the Copper Lake processors later this year.

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

While this algorithm is efficient and fast, there have been recent improvements in attacks (PDF Warning) against the signature scheme GeMSS is based on that suggest that there may be problems that could surface with more research.

NIST Round 2 and Post-Quantum Cryptography (part 1)

NIST Round 2 and Post-Quantum Cryptography (part 1)

This means that a breakdown of the asymmetric session at the beginning of the connection, leads to the attacker being able to read the secret key for AES, which breaks the encryption for the rest of the connection.

Quantum Computing – Is the World of a Security Internet Over?

Quantum Computing – Is the World of a Security Internet Over?

After decades and billions of dollars in research, designs are finally coming online that can solve tasks faster than classical computer designs.

Open Quantum Safe

Open Quantum Safe

The field of quantum-safe cryptography, also called post-quantum or quantum-resistant cryptography, aims to construct public key cryptosystems that are believed to be secure even against quantum computers. The goal of the Open Quantum Safe (OQS) project is to support the development and prototyping quantum-resistant cryptography.